connect

Fail

Audited by Snyk on Feb 28, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). This skill asks users to paste Clerk publishable and secret keys and then instructs embedding those keys verbatim into CLI arguments, generated .env/.connect files and commands, which requires the LLM to handle and output secret values directly (high exfiltration risk).

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.70). clerk.com is a known, legitimate identity provider (low risk), but the generated Studio host under the unknown exe.xyz domain (the "exe" label and .xyz TLD are commonly used for disposable/typosquat sites and can host arbitrary executables/services) is potentially suspicious and should be verified before trusting downloads or running deployed code.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The deploy flow SSHs to exe.dev and explicitly clones and runs the "selem/docker-for-all" repository on the Studio VM, so remote code from that git repo is fetched and executed at runtime (selem/docker-for-all on the Studio at .exe.xyz).

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill instructs deploying to a VM and creating system-level files under /opt, generating service configs, and running (or troubleshooting with) sudo docker compose on the target host, which modifies system state and requires elevated privileges on that machine.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 28, 2026, 02:46 PM